A data integrity vulnerability exists in the web interface /cgi-bin/upload_config.cgi functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to configuration modification. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-50033 | A data integrity vulnerability exists in the web interface /cgi-bin/upload_config.cgi functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to configuration modification. An attacker can make an unauthenticated HTTP request to trigger this vulnerability. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:peplink:smart_reader:v1.2.0:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Thu, 21 Aug 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Peplink
Peplink smart Reader Peplink smart Reader Firmware |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:h:peplink:smart_reader:-:*:*:*:*:*:*:* cpe:2.3:o:peplink:smart_reader_firmware:1.2.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Peplink
Peplink smart Reader Peplink smart Reader Firmware |
Wed, 28 Aug 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-11-04T18:17:46.118Z
Reserved: 2023-11-22T15:48:03.435Z
Link: CVE-2023-45744
Updated: 2025-11-04T18:17:46.118Z
Status : Modified
Published: 2024-04-17T13:15:07.827
Modified: 2025-11-04T19:16:01.567
Link: CVE-2023-45744
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD